81. Tools
for documenting defects as they are found and for tracking their status is

Defect tracking tools

Status Report

Test log

82. The best
reason for using independent software testing teams is that_______

quality of software is given as much
consideration as the project budget and timeline

software developers do not need to do any testing

testers do not get involved with the project
until testing begins

stranger will test the software mercilessly

83. Which among
process of analyzing and correcting syntactic, logic and other errors
identified during testing?

Dynamic Analysis

Desk Checking

Debugging

Error guessing

84. Which
of the following statement is correct about monitoring performance?

The risks to be organization and its products
from using the process should be monitored

All
the listed options

Management should review the process improvement
program regularly

Careful analysis of results of testing should be
performed.

85.
Following are the key indicators to develop testers dashboards EXCEPT

Schedule status

Severity of recorded defect

Count of defects

Budget status

86. Testing on,
above and below the edges of classes is called _______________

Test contributions

Cause effect diagram

Equilance Class partitioning

Boundary value analysis

87.Which
among the following are the major concerns testers have on entering the test
execution?

Inadequate time or resources

All the listed options

Significant problem will not be uncovered during
testing

Software not in testable mode

88. Which among
the following are the techniques to prevent defects?

Training and eduction and methodology and
standards QA,Training and eduction, defensive design and code and
finally methodology and standards

QA &QC

QA, Training and education, QC and methodology
& standards

QA,QC, defensive design and code and finally
methodology and standards

89. Which among
the following is the best strategy to reduce impact if there is a problem?

Reduce scope of the system and also do not use
latest unproven technology

Contingency plans

All the listed options

Disaster recovery plan, contingency plans

90. Test
activities are recorded on a _____________

Test log

Test plan

Defect tracking sheet

All the listed option

91. Which
one of the following statements is correct?

Policies help in defining products

Policies are set by senior management

Policies are set by Test managers

Policies are guidelines

92. A
testing method in which the test data are derived solely from the program
structure is ____________

Structural testing

Glass box testing

White box testing

All the listed options

93. Defects
are measure in relation to ____________________

projects efforts

total number of defects

development team size

lines of code

94. The
tool used to verify the operational system results are in compliance with
organizations policies and procedures is called _________

Checklists and inspections

confirmation or examination

Fact fining

Tracing

95. To define
test objectives testers need to do the following EXCEPT

Data bridges and
filters

Validation process for incoming external data

Define
each objective so that you can reference it by a number

Development of a model showing the internal and
external dependency links among core business areas, processes and
information systems

96. The tool used
to examine the usability of test data for maintenance is called _____________

Completion based analysis and mapping

Test data

Peer review

Inspections

97. Decision
to stop test execution should be based upon ________________

All the listed options

a % of coverage for each coverage category

rate of error detection falls below a specified
threshold

successful use of specific test case design
methodologies.

98. Which of the following is not a perspective of quality

Translucent

User Based

Transcedent

Product Based

99.
Temptations causes employees to engage in the following improper acts EXCEPT

Weak internal audit function

High decentralization

Non existent or ineffective control

High Centralization

100. Following
are guidelines adhered to tool usage to be more effective and efficient EXCEPT

1.The use of test tools should be
incorporated into test processes so that the use of tools is mandatory, not
optional

2.Tester should work together to
build open source testing tools

3. Testers should have access to an
individual in their organization , or the organization that developed the tool.

4. Testers should not be permitted to
use tools for which they have not received formal training.

101. The table of
contents of a test plan might contain the following EXCEPT

Test objective

Test Scope

Assumptions

Test
matrix

102. Which among the
following is not a defect?

An extra function provided in the system

None of the listed options

A Requirement not implemented in the system

A Requirement implemented incorrectly

103. The concept
of defensive code involves

1.adding a syntax checker in middle of code

2. None of the listed options

3. adding code to a program so that two
parts of program must fail before a majorproblem occurs

4. adding throw() and catch()

104. Integration
testing should begin once unit testing for the components to be integrated is
complete (T/F)

True

105. Which of the
following is an informal analysis of the program source code yielding
computer software ready for testing?

Code walkthrough

Code verification

Code inspection

Functional Review

106. Which of the
following strategic issues needs to be addressed in successful software testing
process?

1.Specify requirements in a quantifiable
manner

2. All the listed options

3. Conduct formal technical review
prior to testing

4. Consider using independent test
terms

107. Which
among the following is NOT a characteristic of good test case?

Clear to execute

It should be repeatable

It is not traceable to the requirements

A good test case should be repeatable but not
traceable to the requirements.

109 .Correct
definition of vulnerability?

1. vulnerability is the potential loss to
an organization as for example, the risk resulting from the
misuse of its computer. this may involve unauthorized
disclosure, unauthorized modification and/or loss of information resources, as
well as the authorized but incorrect use of a computer. risk can be measured by
performing risk analysis.

2.Vulnerability
is something capable of exploiting vulnerability in the security of a computer
system or application vulnerability include both hazards and events that can
trigger flaws.

3. vulnerability is a design, implementation, or operations flaw
that may be exploited by a threat, the flaws causes the computer system
or application to operate in a fashion different from its published
specifications and to result in destruction or misuse of equipment or data.

12. Unit testing is conducted in the
development environment (T/F). True

13. Test planning should begin

before Requirement collection

At the time of Requirement definition

after Requirement collection

after design

14. Summary project status report include
information like

Resource, status, budget

Time, status, budget

Resource, budget, time

time, resource, budget

15. Following are the examples of
satisfaction metrics EXCEPT

Ease of use

Acceptance criteria met

Customer subject assessment

Customer satisfaction

16. A white box testing technique that
measures the number of or percentage of decision outcomes covered by the test
cases designed is called

Consistent condition set

Basis path coverage

Modified decision coverage

Decision coverage

17. The functional testing that verifies
the procedures to balance file function property is called

Compatability testing

File integrity

Compliance
testing

Integration testing

18. Activities
asssociated with risk management are

Risk reduction methods

Risk analysis

Risk Migitation

Risk estimation

19. One of the
most commonly identified weakness in software testing is

lack of time

lack of skilled resources

lack of metrics

lack of defects count

20. To develop a
software test matrix follow these steps EXCEPT

Definite test plan

prepare the software test matrix

define test as required

define verification tests

21. Test coverage
can be measured by EXCEPT ________________-

Traceability

Global data coverage

All of the listed options

User specified data coverage

Statement coverage

22. When one
application feeds data to second application, the latter application is called
as _____________application

Regression

Stage
containment

Downstream

Message Processing

23. The test tool
that is used to test manual procedures in order to verify whether authorization
procedures are followed is

Symbolic execution

Cause effect graphing

Inspections

Pareto analysis

24. Which
of the following testing demonstrates key functional capabilities by testing a
string of units that accomplish a specific function in the application?

Thread testing

Unit testing

Integration testing

Black box testing

25. Due to a
change in design, the requirement for an already coded critical software
component got modified in its entirely. The developer had to modify the
code based on new requirement. Testing team is to choose the appropriate
type of regression test to minimize the impact to the project schedule.
Which type of regression test would you choose.

Full regression test

Unit regression test

Regional regression test

System Testing

26. Cost of
confirmation includes

Training Survey etc.

Studies

Training Survey etc.,

Studies and Survey

Rework

27. The test
schedule section includes which of the following except

Sequence of tests

Major test activities

The
types of tests that must be conducted

Initial estimates for each activity

28 High priority in any defect management
program should be

To improve the process

All the listed options

to prevent defects

to identify the best prevents on techniques and
implement them

29. Testers
insert additional code into a program to collect information about program
behavoiur during program execution. This is called as ___________

Instrumentation

Dynamic assertion

Inspection

Integration Testing

30. The inability
of a system or components to perform its required functions when specified
requirement is called

Bug

error

Failure

Defect

31. Which of the
following statement about different risk type is correct?

It is not difficult to create test scenarios for
high level risks

Strategic
risks are the high level business risk faced by the software system

Tactical risk are subsets at a higher level
of the strategic risks

32. Which among
the following is NOT a way to define and measure test coverage?

User specified data coverage

Global data coverage

Stable/ Control Coverage

Modified Decision coverage

33. Which among
the following is the correct sequence to test execution?